HP has agreed to sell its intrusion detection and prevention software unit TippingPoint to security vendor Trend Micro for $300 million. But analysts say Trend Micro faces stiff breach detection and incident response competition.
Someone green-light this drama: Sony, after suffering a massive data breach that led to the leak of personal information and embarrassing corporate emails, has agreed to a data-breach settlement worth up to $8 million.
Bob Carr, CEO of Heartland Payment Systems, contends that not enough progress has been made in improving payments security in the seven years since the processor experienced a massive breach. Find out why he argues that retailers and processors still have much more to do.
As the Senate continues to wrestle with the Cybersecurity Information Sharing Act of 2015, with a vote expected next week, opposition to the bill from some privacy groups and major technology firms, including Apple, is heating up.
Data Breaches in 2015 are on pace to break all records. There have been 551 confirmed breaches, with over 150 million compromised records. In 60% of cases, attackers are able to compromise within minutes. It is no longer adequate for enterprises to react once an alert indicates they are under attack.
How...
The FBI and Secret Service are investigating reports that CIA Director John Brennan's personal AOL email account was hacked by an American teenager, who found and leaked sensitive information on top U.S. intelligence and national security officials.
Do you know the most common risk factor for corporate cybercrime? Employees. Sometimes, the threat actually originates from within, when employees' ignorance and/or negligence opens the door for cybercriminals.
This eBook is designed to provide you with tips for educating your employees
about cybersecurity. It's...
In the first six months of 2015, the number of crypto-attacks equaled the volume experienced in all of 2014. This increase illustrates how widespread this problem is becoming for businesses of all sizes. It is entirely possible that you or someone in your company will be held ransom by a cryptor at some point- a...
Dow Jones has dismissed a competitor's report, which claims that attackers operating from Russia hacked into the company's servers and stole sensitive financial information for insider-trading purposes.
In an exclusive interview, Harris Health System CISO Jeffrey Vinson explains how his team is spearheading an effort to help the federal government and the healthcare industry improve cyber threat intelligence sharing.
By identifying abnormal data access behavior, machine learning systems could improve breach prevention and fraud detection in the healthcare arena and other sectors, contends artificial intelligence expert Robert Leithiser.
FBI Director James Comey's declaration that the Obama administration will not pursue legislation to require vendors to create a backdoor that would permit law enforcement to circumvent encryption on mobile devices isn't the end of the matter.
It's all over the news - day after day, headline after headline - organizations are falling victim to malware. What can your organization do to stay out of the headlines?
It isn't enough to have a solid plan to address the infection after the impact is felt. Proactively identifying and neutralizing the threat is...
In this first video of a four-part series, Chris Inglis, former deputy director at the NSA and current Chairman of the Securonix advisory board, sits down with Securonix CEO Sachin Nayyar for a candid conversation about cyber security strategy.
How is the threat landscape changing?
And how should companies...
In this second video of a four-part series, Chris Inglis, former NSA deputy director and current Securonix advisory board chair, joins Securonix CEO Sachin Nayyar to discuss the evolution of technological capabilities to defend organizations against increasingly complex cyber attacks.
"We still defend the wrong...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.